• Title/Summary/Keyword: error code

Search Result 1,620, Processing Time 0.026 seconds

Evaluation of Real-time Target Positioning Accuracy in Spinal Radiosurgery (척추방사선수술시 실시간 추적검사에 의한 병소목표점 위치변이 평가)

  • Lee, Dong Joon
    • Progress in Medical Physics
    • /
    • v.24 no.4
    • /
    • pp.290-294
    • /
    • 2013
  • Stereotactic Radiosurgery require high accuracy and precision of patient positioning and target localization. We evaluate the real time positioning accuracy of isocenter using optic guided patient positioning system, ExacTrac (BrainLab, Germany), during spinal radiosurgery procedure. The system is based on real time detect multiple body markers attached on the selected patient skin landmarks. And a custom designed patient positioning verification tool (PPVT) was used to check the patient alignment and correct the patient repositioning before radiosurgery. In this study, We investigate the selected 8 metastatic spinal tumor cases. All type of tumors commonly closed to thoracic spinal code. To evaluate the isocenter positioning, real time patient alignment and positioning monitoring was carried out for comparing the current 3-dimensional position of markers with those of an initial reference positions. For a selected patient case, we have check the isocenter positioning per every 20 millisecond for 45 seconds during spinal radiosurgery. In this study, real time average isocenter positioning translation were $0.07{\pm}0.17$ mm, $0.11{\pm}0.18$ mm, $0.13{\pm}0.26$ mm, and $0.20{\pm}0.37$ mm in the x (lateral), y (longitudinal), z (vertical) directions and mean spatial error, respectively. And body rotations were $0.14{\pm}0.07^{\circ}$, $0.11{\pm}0.07^{\circ}$, $0.03{\pm}0.04^{\circ}$ in longitudinal, lateral, table directions and mean body rotation $0.20{\pm}0.11^{\circ}$, respectively. In this study, the maximum mean deviation of real time isocenter positioning translation during spinal radiosurgery was acceptable accuracy clinically.

A Quantization-adaptive Watermarking Algorithm to Protect MPEG Moving Picture Contents (MPEG 동영상 컨텐츠 보호를 위한 양자화-적응적 워터마킹 알고리즘)

  • Kim Joo-Hyuk;Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.149-158
    • /
    • 2005
  • This paper proposed a blind watermarking method for video contents which satisfies both the invisibility and the robustness to attacks to prohibit counterfeiting, modification, illegal usage and illegal re-production of video contents. This watermarking algorithm targets MPEG compression system and was designed to control the amount of watermarking to be inserted according to the adaptive quantization scale code to follow the adaptive quantization of the compression system. The inserting positions of the watermark were chosen by considering the frequency property of an image and horizontal, vertical and diagonal property of a $8{\times}8$ image block. Also the amount of watermarking for each watermark bit was decided by considering the quantization step. This algorithm was implemented by C++ and experimented for invisibility and robustness with MPEG-2 system. The experiment results showed that the method satisfied enough the invisibility of the inserted watermark and robustness against attacks. For the general attacks, the error rate of the extracted watermark was less than $10\%$, which is enough in robustness against the attacks. Therefore, this algorithm is expected to be used effectively as a part in many MPEG systems for real-time watermarking, especially in the sensitive applications to the network environments.

Cloud Messaging Service for Preventing Smishing Attack (스미싱 공격 방지를 위한 클라우드 메시징 서비스)

  • Park, Hyo-Min;Kim, Wan-Seok;Kang, So-Jeong;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.285-293
    • /
    • 2017
  • They are rapidly evolving malicious attacks on smart devices, and to timely protect the smart devices from these attacks has become a very important issue. In particular, smishing attack has emerged as one of the most important threats on the smartphone. In this paper, we propose the cloud service that can fundamentally protect the user from the risk of smishing attack. The proposed scheme provides cloud messaging service that can filter text messages including URLs in the user's smart device, view and manage them through a virtual machine provided by a cloud server. The existing techniques for preventing smshing attacks protect only malicious code of a known pattern and there is the possibility of error such as FP(False Positive) or FN(False Negative). However, since the proposed method automatically filters all text messages including URLs, storing, viewing, and managing them in their own storage space on the cloud server, it can completely block the installation of malwares(malicious codes) on the user's smart device through smishing attacks.

A dryout mechanism model for rectangular narrow channels at high pressure conditions

  • Song, Gongle;Liang, Yu;Sun, Rulei;Zhang, Dalin;Deng, Jian;Su, G.H.;Tian, Wenxi;Qiu, Suizheng
    • Nuclear Engineering and Technology
    • /
    • v.52 no.10
    • /
    • pp.2196-2203
    • /
    • 2020
  • A dryout mechanism model for rectangular narrow channels at high pressure conditions is developed by assuming that the Kelvin-Helmholtz instability triggered the occurrence of dryout. This model combines the advantages of theoretical analysis and empirical correlation. The unknown coefficients in the theoretical derivation are supported by the experimental data. Meanwhile, the decisive restriction of the experimental conditions on the applicability of the empirical correlation is avoided. The expression of vapor phase velocity at the time of dryout is derived, and the empirical correlation of liquid film thickness is introduced. Since the CHF value obtained from the liquid film thickness should be the same as the value obtained from the Kelvin-Helmholtz critical stability under the same condition, the convergent CHF value is obtained by iteratively calculating. Comparing with the experimental data under the pressure of 6.89-13.79 MPa, the average error of the model is -15.4% with the 95% confidence interval [-20.5%, -10.4%]. And the pressure has a decisive influence on the prediction accuracy of this model. Compared with the existing dryout code, the calculation speed of this model is faster, and the calculation accuracy is improved. This model, with great portability, could be applied to different objects and working conditions by changing the expression of the vapor phase velocity when the dryout phenomenon is triggered and the calculation formula of the liquid film.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

A modification of SWMM to simulate permeable pavement, and the effect analysis on a release of treated wastewater and the permeable pavement (투수성 포장을 고려한 SWMM의 수정 및 하수처리 재이용수와 투수성 포장의 효과분석)

  • Lee, Jung-Min;Lee, Sang-Ho;Lee, Kil-Seong
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.2 s.163
    • /
    • pp.109-120
    • /
    • 2006
  • Permeable pavement and release of treated wastewater into streams can increase streamflow of urban streams for a dry weather period. A SWMM code was modified to have a permeable pavement option. The modified SWMM was applied to continuous simulations of urban runoff from Hakuicheon watershed and it was used to analyse the effect of a permeable pavement installation and the reuse of treated wastewater. A critical error in the pan coefficient multiplication was also corrected in the modification. The analysis results of the reuse of treated wastewater is as follows: The low flow ($Q_{275}$) increases by 1.63 times as much as the current one and the drought flow ($Q_{355}$) increases by 3.57 times as much as the current one. If the impervious area in the Hakuicheon watershed is replaced with the permeable pavement area by 10 percent, the low flow and the drought flow increases by 3 percent and 17 percent, respectively. The results shows the effectiveness of the release of treated wastewater into stream to increase urban streamflow. The permeable pavement installation also play a minor role in the drought flow increase.

Simulation Implementation of Fossil Power Plant Condensate Pumps' Rotation Operation Logic Using MATLAB/Simulink (MATLAB/Simulink를 이용한 화력발전소 복수펌프 순환기동로직 시뮬레이션 구현)

  • Yoon, Chang-Sun;Hong, Yeon-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.693-699
    • /
    • 2016
  • The simulators for pump operation developed by domestic or overseas research have been developed for dynamic analysis or operator training purposes. However, previous developed simulators focused on the operators so they are unsuitable for logic designers or commissioning engineers who need to change the operation conditions or logics arbitrarily. In addition, the simulator for two or more condensate pumps' operation, which can be used easily by plant designers or operators, has not been developed. Accordingly, this paper suggests a simulation method that can be used easily for plant designers or operators using MATLAB Simulink. This suggestion helps users who can use MATLAB to implement ANSI/ISA S5.2, which is applied mainly for DCS (Distributed Control System). In addition, to implement the logics specified in the CODE, Sub-Systems were created for the block and evaluated to determine if they can be used in the simulator. In the working level stage using the suggested method, all error possibilities that might occur during the three pumps' rotation operation could be verified with the suggested simulator during the design stage or before operation.

Comparative Evaluation of Radioactive Isotope in Concrete by Heavy Ion Particle using Monte Carlo Simulation (몬테카를로 시뮬레이션을 통한 중하전입자의 콘크리트 방사화 비교평가)

  • Bae, Sang-Il;Cho, Yong-In;Kim, Jung-Hoon
    • Journal of radiological science and technology
    • /
    • v.44 no.4
    • /
    • pp.359-365
    • /
    • 2021
  • A heavy particle accelerator is a device that accelerates particles using high energy and is used in various fields such as medical and industrial fields as well as research. However, secondary neutrons and particle fragments are generated by the high-energy particle beam, and among them, the neutrons do not have an electric charge and directly interact with the nucleus to cause radiation of the material. Quantitative evaluation of the radioactive material produced in this way is necessary, but there are many difficulties in actual measurement during or after operation. Therefore, this study compared and evaluated the generated radioactive material in the concrete shield for protons and carbon ions of specific energy by using the simulation code FLUKA. For the evaluation of each energy of proton beam and carbon ion, the reliability of the source term was secured within 2% of the relative error with the data of the NASA Space Radiation Laboratory(NSRL), which is an internationally standardized data. In the evaluation, carbon ions exhibited higher neutron flux than protons. Afterwards, in the evaluation of radioactive materials under actual operating conditions for disposal, a large amount of short-lived beta-decay nuclides occurred immediately after the operation was terminated, and in the case of protons with a high beam speed, more radioactive products were generated than carbon ions. At this time, radionuclides of 44Sc, 3H and 22Na were observed at a high rate. In addition, as the cooling time elapsed, the ratio of long-lived nuclides increased. For nonparticulate radionuclides, 3H, 22Na, and for particulate radionuclides, 44Ti, 55Fe, 60Co, 152Eu, and 154Eu nuclides showed a high ratio. In this study, it is judged that it is possible to use the particle accelerator as basic data for facility maintenance, repair and dismantling through the prediction of radioactive materials in concrete according to the cooling time after operation and termination of operation.

A Study on the Data Cleaning and Standardization of National Ecosystem Survey in Korea (전국자연환경조사 데이터 정제와 표준화 방안 연구)

  • Kwon, Yong-Su;Song, Kyohong;Kim, Mokyoung;Kim, Kidong
    • Korean Journal of Ecology and Environment
    • /
    • v.53 no.4
    • /
    • pp.380-389
    • /
    • 2020
  • Research on diagnosing and predicting the response of ecosystems caused by environmental changes such as artificial disturbance and climate change is emerging as the most important issue of biodiversity and ecosystem researches. This study aims to clean, standardize, and provide the results of National Ecosystem Survey which should be considered fundamentally in diagnosing and predicting ecosystem changes in the form of dataset. To refine and clean the dataset we developed a simple verification program based on the fifth National Ecosystem Survey Guideline and applied that program to the data from the second (1997~2005), third (2006~2013) and fourth (2014~2018) National Ecosystem Survey. Data quality control processes were implemented including (1) standardization of terminology, (2) similar data table integration, (3) unnecessary attribute and error elimination, (4) unification of different input items, (5) data arrangement in codes, and (6) code mapping for input items. These approaches and methods are the first attempt propose an option for ecological data standardization in Korea. The standardized dataset of National Ecosystem Survey in Korea will be easily accessible, reusable for both researchers and public. In addition, we expect it will contribute to the establishment of diverse environmental policies concerning environmental assessments, habitat conservation, prediction of endangered species distribution and ecological risks due to climate change. The dataset through this study is open freely online via EcoBank (nie-ecobank.kr) which is the first ecological information portal system in Korea developed by National Institute of Ecology.

An application of MMS in precise inspection for safety and diagnosis of road tunnel (도로터널에서 MMS를 이용한 정밀안전진단 적용 사례)

  • Jinho Choo;Sejun Park;Dong-Seok Kim;Eun-Chul Noh
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.26 no.2
    • /
    • pp.113-128
    • /
    • 2024
  • Items of road tunnel PISD (Precise Inspection for Safety and Diagnosis) were reviewed and analyzed using newly enhanced MMS (Mobile Mapping System) technology. Possible items with MMS can be visual inspection, survey and non-destructive test, structural analysis, and maintenance plan. The resolution of 3D point cloud decreased when the vehicle speed of MMS is too fast while the calibration error increased when it is too slow. The speed measurement of 50 km/h is determined to be effective in this study. Although image resolution by MMS has a limit to evaluating the width of crack with high precision, it can be used as data to identify the status of facilities in the tunnel and determine whether they meet disaster prevention management code of tunnel. 3D point cloud with MMS can be applicable for matching of cross-section and also possible for the variation of longitudinal survey, which can intuitively check vehicle clearance throughout the road tunnel. Compared with the measurement of current PISD, number of test and location of survey is randomly sampled, the continuous measurement with MMS for environment condition can be effective and meaningful for precise estimation in various analysis.